Question No: 186 – (Topic 2)

The scope of your engagement is to include a target organization located in California with a /24 block of addresses that they claim to completely own. Which site could you utilize to confirm that you have been given accurate information before starting reconnaissance activities?

Question No: 187 CORRECT TEXT – (Topic 2)

is a wireless network cracking tool that exploits the vulnerabilities in the RC4 Algorithm, which comprises the WEP security parameters.

Answer: WEPcrack

Question No: 188 – (Topic 2)

You execute the following netcat command:

c:\target\nc -1 -p 53 -d -e cmd.exe

What action do you want to perform by issuing the above command?

Capture data on port 53 and performing banner grabbing.

Capture data on port 53 and delete the remote shell.

Listen the incoming traffic on port 53 and execute the remote shell.

Listen the incoming data and performing port scanning.

Answer: C

Question No: 189 – (Topic 2)

John works as a Professional Penetration Tester. He has been assigned a project to test the Website security of www.we-are-secure Inc. On the We-are-secure Website login page, he enters =#39;or#39;#39;=#39; as a username and successfully logs on to the user page of the Web site. Now, John asks the we-are-secure Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve the security of the we-are-secure Website login page from the SQL injection attack?

Use the escapeshellarg() function

Use the session_regenerate_id() function

Use the mysql_real_escape_string() function for escaping input

Use the escapeshellcmd() function

Answer: C

Question No: 190 CORRECT TEXT – (Topic 2)

Fill in the blank with the appropriate act name.

The act gives consumers the right to ask emailers to stop spamming them.